Would there be risks associated with an attacker getting a copy of the complete businss system specifications. Justify your position and provide examples to support your argument. Solution Yes, the name is self suggests that he is an attacker which says he might attack many different confidential information related to the business processing system specification. There may be a lot of risk when the confidential information of a particular business is spread out side the world the companies shares property valuable information everything will be in the hands of a third party who is well known to attack at any time at any place and at the right way once the companies confidential information is spread outside the company no one can estimate what the loss will happen in further to that company. Recently a person working in a big MNC spread out his confidential Company Private information outside the company and you had been fined with a great penalty. .